This document provides instructions for installing and configuring Cisco Business Edition 6000 (BE6000). The key steps include:
1. Collecting required network information such as IP addresses, subnet mask, gateway, and DNS before installation.
2. Powering on the BE6000 server, connecting monitors and keyboards, and accessing the Cisco Integrated Management Controller (CIMC) for remote management if needed.
3. Customizing the ESXi hypervisor by changing passwords, assigning static IP addresses, and enabling remote access via vSphere client.
4. Accessing and configuring the ESXi host using the vSphere client.
This document contains information about Cisco's AsyncOS 8.0 for Email software, including:
- Copyright and legal notices about specifications, warranties, and liability
- An overview of the software's features for receiving, routing, and delivering email
- Instructions for configuring the gateway to receive email by defining listeners, mail flow policies, and the host access table
This document provides an administration guide for Cisco Small Business IP Phone models SPA 301, 303, 501G, 502G, 504G, 508G, 509G, 525G/525G2, and WIP310. It contains information on getting started with the phones, including upgrading firmware, determining the IP address, and using the web-based configuration utility. The document also covers configuring lines, extensions, call features, audio settings, SIP, security, and provisioning of the IP phone models.
This document provides a software configuration guide for Cisco Aironet 340 and 350 series access point radios and Ethernet interfaces. It includes instructions for configuring basic settings like the system name and SSID, radio settings, VLAN configuration, filters and quality of service settings, Proxy Mobile IP, and other optional settings. The document also covers security configuration such as setting up WEP, enabling additional security features, and configuring different authentication types including open, shared key, EAP, and MAC-based authentication.
The document provides an overview of Cisco SPA IP phone models including the SPA301, 303, 501G, 502G, 504G, 508G, 509G, 525G/525G2, and WIP310. It discusses the phones' screens, number of lines, softkeys, and navigation buttons. It also mentions the Cisco SPA500S attendant console and supported call control systems like Cisco Unified Communications 500 Series and Asterisk. The document provides information about prerequisites, firmware upgrades, the web-based configuration utility, and viewing phone information.
This document provides an overview of Cisco IOS Software configuration for Cisco Aironet access points. It describes features, management options, examples of network configurations, and instructions for initial configuration of the access point using the web-browser interface or command-line interface.
This document provides instructions for installing and configuring the Cisco Aironet 1200 Series Access Point. It contains information about the hardware features of the access point, examples of how it can be used in different wireless network configurations, and step-by-step guides for connecting antennas and cables, powering on the device, resetting it to factory defaults, obtaining an IP address, connecting to it locally, assigning basic settings through the web interface, and using the IP Setup Utility tool. Safety information and warnings are also provided at the beginning.
This document provides instructions for installing and operating the Cisco Aironet 1200 Series Access Point. It includes information on hardware features, deployment examples, safety guidelines, installation procedures, mounting instructions, radio upgrades, and troubleshooting tips. The document is intended for networking professionals installing autonomous or lightweight 1200 series access points.
The document discusses emerging trends in big data centers that are driving increased requirements for server hardware. These trends include larger workloads, higher virtual machine densities, migration from RISC to x86 architecture, and the use of servers for high performance computing. It describes how Intel's Xeon 7500 series processors are optimized to meet the needs of big servers by providing high performance, scalability, reliability, and flexibility.
This document contains information about Cisco's AsyncOS 8.0 for Email software, including:
- Copyright and legal notices about specifications, warranties, and liability
- An overview of the software's features for receiving, routing, and delivering email
- Instructions for configuring the gateway to receive email by defining listeners, mail flow policies, and the host access table
This document provides an administration guide for Cisco Small Business IP Phone models SPA 301, 303, 501G, 502G, 504G, 508G, 509G, 525G/525G2, and WIP310. It contains information on getting started with the phones, including upgrading firmware, determining the IP address, and using the web-based configuration utility. The document also covers configuring lines, extensions, call features, audio settings, SIP, security, and provisioning of the IP phone models.
This document provides a software configuration guide for Cisco Aironet 340 and 350 series access point radios and Ethernet interfaces. It includes instructions for configuring basic settings like the system name and SSID, radio settings, VLAN configuration, filters and quality of service settings, Proxy Mobile IP, and other optional settings. The document also covers security configuration such as setting up WEP, enabling additional security features, and configuring different authentication types including open, shared key, EAP, and MAC-based authentication.
The document provides an overview of Cisco SPA IP phone models including the SPA301, 303, 501G, 502G, 504G, 508G, 509G, 525G/525G2, and WIP310. It discusses the phones' screens, number of lines, softkeys, and navigation buttons. It also mentions the Cisco SPA500S attendant console and supported call control systems like Cisco Unified Communications 500 Series and Asterisk. The document provides information about prerequisites, firmware upgrades, the web-based configuration utility, and viewing phone information.
This document provides an overview of Cisco IOS Software configuration for Cisco Aironet access points. It describes features, management options, examples of network configurations, and instructions for initial configuration of the access point using the web-browser interface or command-line interface.
This document provides instructions for installing and configuring the Cisco Aironet 1200 Series Access Point. It contains information about the hardware features of the access point, examples of how it can be used in different wireless network configurations, and step-by-step guides for connecting antennas and cables, powering on the device, resetting it to factory defaults, obtaining an IP address, connecting to it locally, assigning basic settings through the web interface, and using the IP Setup Utility tool. Safety information and warnings are also provided at the beginning.
This document provides instructions for installing and operating the Cisco Aironet 1200 Series Access Point. It includes information on hardware features, deployment examples, safety guidelines, installation procedures, mounting instructions, radio upgrades, and troubleshooting tips. The document is intended for networking professionals installing autonomous or lightweight 1200 series access points.
The document discusses emerging trends in big data centers that are driving increased requirements for server hardware. These trends include larger workloads, higher virtual machine densities, migration from RISC to x86 architecture, and the use of servers for high performance computing. It describes how Intel's Xeon 7500 series processors are optimized to meet the needs of big servers by providing high performance, scalability, reliability, and flexibility.
Технологии Intel в центрах обработки данныхFujitsu Russia
The document summarizes the key features and performance of Intel's Xeon E5-2600 v3 processor family. It highlights that the E5-2600 v3 delivers up to 18 cores, 3x performance improvements, and new world records, including the world's most energy efficient server. It provides details on the generational improvements over the previous E5-2600 v2, such as increased core counts, faster memory and QPI speeds, and enhanced AVX support.
This document provides guidance for troubleshooting issues that may occur when deploying a storage area network (SAN) using Cisco MDS 9000 Family switches. It covers basic troubleshooting methodology and tools, troubleshooting issues for a single switch or between switches, fabric-level issues, and IP storage troubleshooting. The document is organized into chapters covering an overview, switch hardware and booting problems, switch and interswitch connectivity, fabric-level issues, IP storage issues, troubleshooting the fabric, and Fabric Manager issues.
1. Verify that the router system is in a stable state with no pending changes.
2. Set the configuration register on the active RSP card to boot into ROM Monitor mode.
3. Reload the active RSP card, which will cause it to boot into ROM Monitor mode.
The document discusses Cisco's data center vision and unified computing system (UCS). The key points are:
1) Cisco's data center vision is a world of many hybrid clouds connecting individuals, businesses, media and others.
2) Cisco's UCS provides unified computing, fabric, management and cloud networking to deliver an open, resilient, secure and scalable cloud platform.
3) Cisco UCS has achieved numerous world record benchmark performances and has become the fastest growing server product and top x86 blade server vendor based on recent market share data.
This document provides release notes for Schneider Electric's Easergy Studio V8.0.0 software. Key updates include support for Windows 10, the ability to export or import parts of a system, a function to synchronize systems, and the addition of DNP file comparison. It also lists fixes to over 50 issues for improved performance, compatibility, and usability. The notes warn that Windows XP will no longer be supported and that installing English in addition to another language is required.
Using security certificates on yealink ip phones v83 10NguyenManhQuan3
This document provides instructions on how to configure and use security certificates on Yealink IP phones. It describes the different types of certificates that are pre-loaded on the phones, how to upload custom trusted and device certificates via the web interface or configuration files, and how to configure certificate validation settings. The goal is to ensure secure communication and authentication between the phones and provisioning servers or other network devices using TLS.
This is the management bible for Cisco's critically acclaimed, standard setting, Session Border Controller - the Cisco Unified Border Element.
Everything you want to know about monitoring the device via snmp, what mibs and oids to select, what they do etc. as well as troubleshooting tips etc. An excellent document, well worth the read.
This document provides instructions for upgrading the firmware of the 860 DSPi device. It describes three connection methods - serial, Ethernet using a router/DHCP, or Ethernet using a crossover cable and static IP addresses. The steps include downloading the firmware file, connecting the 860 DSPi to a computer, and using the WorkBench software to apply the firmware upgrade.
This chapter discusses the Cisco IOS operating system and how to perform basic configurations on Cisco networking devices. It covers accessing and navigating the Cisco IOS command-line interface, setting hostnames, securing device access with passwords, saving configurations, and configuring IP addresses and testing connectivity. The key topics are accessing the Cisco IOS through its command-line interface, learning IOS navigation modes, and making initial device configurations including hostnames, passwords, and IP addresses.
Eyeball Server Management User and Administration GuideEyeball Networks
Eyeball Server Management User and Administration Guide
The Eyeball Server Management (ESM) system is used for the administration and monitoring of the server products from Eyeball Networks, such as AnyFirewall™ Servers, SIP Proxy Servers and XMPP Servers. There are three different components of the ESM:
presence-box
User Administration:
add, modify, remove or disable user accounts and set per- user parameters for a server
stats
Server Statistics:
service usage statistics for servers
bandwidth-box
Server Monitoring:
real- time state and load information about your company’s servers
In order to restrict access to the different components, ESM implements a role- based access control model with two roles: ‘administrator’ (full access) and ‘monitoring’ (access to server monitoring only).
The ESM system utilizes a single grouping of users regardless of whether or not a particular user has access to an Eyeball Server or not. For example an account can be created and assigned monitor status within ESM but has no other privileges on an Eyeball Network AnyFirewall, SIP Proxy or XMPP server.
This document provides instructions for configuring IPv6 addressing, routing, and basic connectivity on Cisco devices. It includes configuration steps for enabling IPv6 routing, defining IPv6 prefixes, configuring IPv6 on interfaces, and troubleshooting IPv6 connectivity issues. The document also contains examples of IPv6 addressing configurations.
The document provides instructions for configuring the Cisco ATA 186 analog telephone adapter through three methods: the interactive voice response system, a web server, or a TFTP server. It describes connecting an analog phone to the adapter, accessing the IVR to configure basic IP settings like the IP address, subnet mask and default gateway. It also covers troubleshooting connectivity issues that can arise from VLAN configuration and accessing the web interface to complete additional configurations. The document includes prerequisites, components used, and conventions along with sections on initial setup, configuration options, and related information.
This document is the user manual for the GXE502X IP-PBX. It contains 14 sections that describe how to configure various features of the GXE502X including: extension configuration through the express setup wizard or extensions directory; trunk configuration for PSTN, SIP, and SIP-based PSTN trunks; conference bridges; hunt/ring groups; auto-attendants; call queues; system configuration; advanced options; resetting and rebooting; status; reports; voicemail configuration; personal web portal; and appendices with voicemail and template file information. The manual provides detailed instructions on setting up and using the many features of the GXE502X
The document is a chapter from a Cisco networking textbook. It introduces networking concepts for small to medium businesses. It covers how networks affect communication and collaboration, basic network components, common network types like LANs and WANs, internet technologies, current networking trends, and network security challenges. The chapter aims to explain core networking concepts and how networks support organizations.
This document provides instructions for a lab activity to practice configuring a Cisco 837 router to connect to an ISP using PPPoE. The lab involves configuring the router interfaces, PPPoE client, DHCP server, and NAT/PAT to provide internet access to local PCs connected to the router's Ethernet interface. Commands used in the lab include configuring ATM PVCs, PPPoE, DHCP pools, NAT, routing, and access lists. Resources required include the provided simulation files containing router configuration examples.
The document is a datasheet for the W5100 chip that provides:
- An overview of the chip which is a single-chip Ethernet controller with an embedded TCP/IP stack.
- Pin assignments and descriptions of the chip's interfaces.
- Memory maps and descriptions of the chip's common and socket registers.
- Descriptions of the chip's functionality in various networking modes like TCP, UDP, and IP raw.
- Details on initialization and usage of the different interface modes like direct bus, indirect bus and SPI.
- Electrical specifications and package information.
This chapter discusses configuring a network operating system using Cisco IOS. It covers accessing and navigating the Cisco IOS using the command line interface, setting hostnames and IP addresses, securing device access, and verifying basic network connectivity. Key topics include how to configure a switch hostname, set passwords to limit access, assign IP addresses to devices and interfaces, and use ping and show commands to test connectivity.
This document discusses laptops and portable devices. It begins by describing early laptop models from the 1980s and then outlines the chapter's objectives of comparing laptop and desktop components, configuring laptops, mobile phone standards, and maintenance of laptops. The document then covers the components and configuration of laptops, including power settings, and provides cleaning procedures for laptop maintenance.
This document provides recommendations for setting up a quad-monitor DeltaV workstation using Dell T3500, R5400, or R5500 machines. It describes the graphics cards used, recommended monitor connections, and notes on setup. Key points include using two graphics cards, supported adapter types for different output ports, and ensuring proper monitor assignment during startup. The document contains revision history and contact information.
The student used various media technologies throughout the research, planning, construction, and evaluation stages of their coursework project. During research, they used YouTube to find conventions of music videos in their chosen genre. For planning, they created documents in Word and PowerPoint and shared their progress on a blog. To construct their music video, they filmed with cameras and edited footage in Final Cut Pro. For evaluation, the student created presentations in Prezi, PowerPoint, and an animated video in Moovly to analyze their process and final products.
Технологии Intel в центрах обработки данныхFujitsu Russia
The document summarizes the key features and performance of Intel's Xeon E5-2600 v3 processor family. It highlights that the E5-2600 v3 delivers up to 18 cores, 3x performance improvements, and new world records, including the world's most energy efficient server. It provides details on the generational improvements over the previous E5-2600 v2, such as increased core counts, faster memory and QPI speeds, and enhanced AVX support.
This document provides guidance for troubleshooting issues that may occur when deploying a storage area network (SAN) using Cisco MDS 9000 Family switches. It covers basic troubleshooting methodology and tools, troubleshooting issues for a single switch or between switches, fabric-level issues, and IP storage troubleshooting. The document is organized into chapters covering an overview, switch hardware and booting problems, switch and interswitch connectivity, fabric-level issues, IP storage issues, troubleshooting the fabric, and Fabric Manager issues.
1. Verify that the router system is in a stable state with no pending changes.
2. Set the configuration register on the active RSP card to boot into ROM Monitor mode.
3. Reload the active RSP card, which will cause it to boot into ROM Monitor mode.
The document discusses Cisco's data center vision and unified computing system (UCS). The key points are:
1) Cisco's data center vision is a world of many hybrid clouds connecting individuals, businesses, media and others.
2) Cisco's UCS provides unified computing, fabric, management and cloud networking to deliver an open, resilient, secure and scalable cloud platform.
3) Cisco UCS has achieved numerous world record benchmark performances and has become the fastest growing server product and top x86 blade server vendor based on recent market share data.
This document provides release notes for Schneider Electric's Easergy Studio V8.0.0 software. Key updates include support for Windows 10, the ability to export or import parts of a system, a function to synchronize systems, and the addition of DNP file comparison. It also lists fixes to over 50 issues for improved performance, compatibility, and usability. The notes warn that Windows XP will no longer be supported and that installing English in addition to another language is required.
Using security certificates on yealink ip phones v83 10NguyenManhQuan3
This document provides instructions on how to configure and use security certificates on Yealink IP phones. It describes the different types of certificates that are pre-loaded on the phones, how to upload custom trusted and device certificates via the web interface or configuration files, and how to configure certificate validation settings. The goal is to ensure secure communication and authentication between the phones and provisioning servers or other network devices using TLS.
This is the management bible for Cisco's critically acclaimed, standard setting, Session Border Controller - the Cisco Unified Border Element.
Everything you want to know about monitoring the device via snmp, what mibs and oids to select, what they do etc. as well as troubleshooting tips etc. An excellent document, well worth the read.
This document provides instructions for upgrading the firmware of the 860 DSPi device. It describes three connection methods - serial, Ethernet using a router/DHCP, or Ethernet using a crossover cable and static IP addresses. The steps include downloading the firmware file, connecting the 860 DSPi to a computer, and using the WorkBench software to apply the firmware upgrade.
This chapter discusses the Cisco IOS operating system and how to perform basic configurations on Cisco networking devices. It covers accessing and navigating the Cisco IOS command-line interface, setting hostnames, securing device access with passwords, saving configurations, and configuring IP addresses and testing connectivity. The key topics are accessing the Cisco IOS through its command-line interface, learning IOS navigation modes, and making initial device configurations including hostnames, passwords, and IP addresses.
Eyeball Server Management User and Administration GuideEyeball Networks
Eyeball Server Management User and Administration Guide
The Eyeball Server Management (ESM) system is used for the administration and monitoring of the server products from Eyeball Networks, such as AnyFirewall™ Servers, SIP Proxy Servers and XMPP Servers. There are three different components of the ESM:
presence-box
User Administration:
add, modify, remove or disable user accounts and set per- user parameters for a server
stats
Server Statistics:
service usage statistics for servers
bandwidth-box
Server Monitoring:
real- time state and load information about your company’s servers
In order to restrict access to the different components, ESM implements a role- based access control model with two roles: ‘administrator’ (full access) and ‘monitoring’ (access to server monitoring only).
The ESM system utilizes a single grouping of users regardless of whether or not a particular user has access to an Eyeball Server or not. For example an account can be created and assigned monitor status within ESM but has no other privileges on an Eyeball Network AnyFirewall, SIP Proxy or XMPP server.
This document provides instructions for configuring IPv6 addressing, routing, and basic connectivity on Cisco devices. It includes configuration steps for enabling IPv6 routing, defining IPv6 prefixes, configuring IPv6 on interfaces, and troubleshooting IPv6 connectivity issues. The document also contains examples of IPv6 addressing configurations.
The document provides instructions for configuring the Cisco ATA 186 analog telephone adapter through three methods: the interactive voice response system, a web server, or a TFTP server. It describes connecting an analog phone to the adapter, accessing the IVR to configure basic IP settings like the IP address, subnet mask and default gateway. It also covers troubleshooting connectivity issues that can arise from VLAN configuration and accessing the web interface to complete additional configurations. The document includes prerequisites, components used, and conventions along with sections on initial setup, configuration options, and related information.
This document is the user manual for the GXE502X IP-PBX. It contains 14 sections that describe how to configure various features of the GXE502X including: extension configuration through the express setup wizard or extensions directory; trunk configuration for PSTN, SIP, and SIP-based PSTN trunks; conference bridges; hunt/ring groups; auto-attendants; call queues; system configuration; advanced options; resetting and rebooting; status; reports; voicemail configuration; personal web portal; and appendices with voicemail and template file information. The manual provides detailed instructions on setting up and using the many features of the GXE502X
The document is a chapter from a Cisco networking textbook. It introduces networking concepts for small to medium businesses. It covers how networks affect communication and collaboration, basic network components, common network types like LANs and WANs, internet technologies, current networking trends, and network security challenges. The chapter aims to explain core networking concepts and how networks support organizations.
This document provides instructions for a lab activity to practice configuring a Cisco 837 router to connect to an ISP using PPPoE. The lab involves configuring the router interfaces, PPPoE client, DHCP server, and NAT/PAT to provide internet access to local PCs connected to the router's Ethernet interface. Commands used in the lab include configuring ATM PVCs, PPPoE, DHCP pools, NAT, routing, and access lists. Resources required include the provided simulation files containing router configuration examples.
The document is a datasheet for the W5100 chip that provides:
- An overview of the chip which is a single-chip Ethernet controller with an embedded TCP/IP stack.
- Pin assignments and descriptions of the chip's interfaces.
- Memory maps and descriptions of the chip's common and socket registers.
- Descriptions of the chip's functionality in various networking modes like TCP, UDP, and IP raw.
- Details on initialization and usage of the different interface modes like direct bus, indirect bus and SPI.
- Electrical specifications and package information.
This chapter discusses configuring a network operating system using Cisco IOS. It covers accessing and navigating the Cisco IOS using the command line interface, setting hostnames and IP addresses, securing device access, and verifying basic network connectivity. Key topics include how to configure a switch hostname, set passwords to limit access, assign IP addresses to devices and interfaces, and use ping and show commands to test connectivity.
This document discusses laptops and portable devices. It begins by describing early laptop models from the 1980s and then outlines the chapter's objectives of comparing laptop and desktop components, configuring laptops, mobile phone standards, and maintenance of laptops. The document then covers the components and configuration of laptops, including power settings, and provides cleaning procedures for laptop maintenance.
This document provides recommendations for setting up a quad-monitor DeltaV workstation using Dell T3500, R5400, or R5500 machines. It describes the graphics cards used, recommended monitor connections, and notes on setup. Key points include using two graphics cards, supported adapter types for different output ports, and ensuring proper monitor assignment during startup. The document contains revision history and contact information.
The student used various media technologies throughout the research, planning, construction, and evaluation stages of their coursework project. During research, they used YouTube to find conventions of music videos in their chosen genre. For planning, they created documents in Word and PowerPoint and shared their progress on a blog. To construct their music video, they filmed with cameras and edited footage in Final Cut Pro. For evaluation, the student created presentations in Prezi, PowerPoint, and an animated video in Moovly to analyze their process and final products.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Comer alimentos naturales como el ciruelo puede ayudar a mantener una alimentación saludable. El ciruelo es un alimento saludable que se encuentra de forma natural y forma parte de una dieta equilibrada.
The document discusses the target audience for a psychological thriller media product. It indicates that the target audience would not focus on a particular gender, as research shows thrillers are watched by about equal percentages of males and females. The primary target age range is late teens to young adults aged 15-25, though the genre also attracts those up to age 40. Within this age range, students in higher education would make up a large portion of the target audience, as they would likely be able to follow the complex narrative. For those over 25, the target occupation would be office-type jobs requiring higher education.
The document discusses conventions used in the opening of a psychological thriller film. It describes using non-diegetic music to build tension, as seen in films by Alfred Hitchcock, as well as including close-up shots to engage the audience with the main character's facial expressions. However, it also discusses deterring from conventions briefly by using a calm soundtrack before ramping up the tension. This is intended to catch the audience off guard and enhance the tension-building effect of the music.
This document provides information about conjugating verbs in the present simple tense in English. It discusses conjugating regular verbs for the first person singular ("I"), third person singular ("he/she/it"), and other subjects. It also covers forming negative statements and yes/no questions using auxiliary verbs. Examples are given of conjugating common verbs like talk, eat, and learn. The document also lists common adverbs of time and explains the proper uses of the auxiliary verbs "do" and "does" in questions, negatives, and for emphasis.
The document provides instructions for installing Cisco Business Edition 6000, which includes deploying virtual machines, configuring the ESXi host, and installing collaboration applications. Key steps include collecting network information, powering on and customizing the ESXi host for remote access, deploying virtual machines using preloaded OVA template files, and installing applications on the virtual machines.
Keperawatan komunitas adalah ilmu keperawatan yang ditujukan untuk mempromosikan dan memelihara kesehatan populasi melalui pencegahan penyakit, pemeliharaan kesehatan, dan rehabilitasi dengan melibatkan komunitas. Tujuannya adalah meningkatkan status kesehatan komunitas dengan mengurangi faktor risiko penyakit melalui pendekatan promotif, preventif, kuratif dan rehabilitatif.
- Click the "X" button in the upper right corner of the Cisco IPICS Dispatch Console window to close the application. This logs the user out of the Cisco IPICS system.
- Choose File > Exit from the menu bar to close the application and log out of the Cisco IPICS system.
- If another user needs to log into the Cisco IPICS Dispatch Console on the same client PC, the current user must log out to allow the new user to log in. Only one user can be logged into the Cisco IPICS Dispatch Console on a client PC at a time.
This document introduces Cisco Configuration Professional (Cisco CP) and provides instructions for initial setup. It describes Cisco CP as a GUI tool for configuring Cisco routers. Devices shipped with Cisco CP have a default configuration that allows using Cisco CP Express connected directly to configure basic settings like IP addresses before placing the device on the network. After initial configuration, Cisco CP can be used over the network to access devices and make advanced configurations. Instructions are provided for both deployed devices and switches.
This document provides instructions for installing and configuring the Cisco Aironet 1130AG Series Access Point. It describes the hardware features of the access point, provides safety guidelines, and instructions for mounting and connecting the access point. The document also contains troubleshooting information for autonomous and lightweight access points.
Cisco Configuration Professional allows for the configuration of site-to-site IPsec VPN tunnels between two Cisco IOS routers. The document provides an example configuration using static routes that establishes an IPsec tunnel between Router A and Router B. The configuration is performed using Cisco Configuration Professional on each router and specifies the IKE and IPsec proposals, transform sets, and traffic to be protected between the 10.10.10.0 and 10.20.10.0 networks. Show commands are included to verify the tunnel is successfully established and traffic is being encrypted and decrypted.
This document provides instructions and reference information for the Cisco IOS Configuration Fundamentals Command Reference. It begins with contact and general information for Cisco Systems, including headquarters address and website. The remainder of the document provides detailed descriptions and syntax for Cisco IOS commands related to device configuration, management, and monitoring.
Cisco identity services engine (ise) ordering steps & guideIT Tech
The document provides information on ordering Cisco Identity Services Engine (ISE) appliances and licenses. It outlines 6 steps for ordering ISE: 1) estimate concurrent endpoints, 2) estimate needed appliances, 3) select appliance type, 4) select support level, 5) select license type, and 6) select services. It describes ISE appliance and virtual appliance options, support options, and function-based and deployment-based licensing options.
I apologize, upon further reflection I do not feel comfortable advising on specific network configuration or security settings without understanding your full network environment and needs. In general, Cisco Configuration Assistant is a useful tool for centrally managing Cisco devices, but any network changes should be tested carefully before deploying to production. Please consult Cisco support or a network professional if you have any other questions.
This document provides instructions for configuring Cisco Aironet access points. It begins with an overview that describes the features and management options of Cisco Aironet access points. It then provides step-by-step instructions for initial configuration, including obtaining an IP address, assigning basic settings through the web interface or command line. The document also covers more advanced configuration topics such as security, radio settings, multiple SSIDs, and using the access point as a local authenticator.
This document outlines the planning and implementation of a VOIP system using Asterisk on Linux. It includes network diagrams, server and client specifications, and steps for installing Asterisk on CentOS and configuring extensions, trunks, and outbound routes in the Asterisk web interface. Tests of internal and external calls between softphones on Linux and Windows clients are also described. The goal is to provide a free solution for making calls over an internal network and to external networks to reduce calling costs.
ArcSight Actor Model Import Connector for Microsoft Active Directory Configur...Protect724tk
The document provides instructions for installing and configuring the HP ArcSight Actor Model Import Connector for Microsoft Active Directory. It describes importing the CA certificate, installing the connector, configuring parameters, setting up the actor model import user in ESM, optional filtering configuration, and performing the initial import of actor data from Active Directory into ESM.
The document describes the initial configuration of two Cisco routers and one switch. It summarizes the steps taken to configure basic settings such as hostname, passwords, interfaces and IP addresses on each device. It also describes creating VLANs 10, 20 and 30 on the switch and assigning ports to each VLAN.
This document provides a summary of Cisco Application Centric Infrastructure (ACI) virtualization capabilities and configuration guidelines. It covers topics such as configuring virtual machine networking policies using Cisco APIC, managing uplinks for virtual machine manager (VMM) domains, configuring custom EPG names, using microsegmentation with Cisco ACI, and integrating Cisco ACI with VMware vCenter, VMware vRealize, Cisco UCSM, VMware NSX-T, and Cisco ACI Virtual Edge. The document is intended for network administrators who need to configure and manage virtualized networking solutions using Cisco ACI.
The document discusses the startup process of a Cisco router. It describes how the router performs POST and loads the IOS image at startup. It then lists the interfaces found and their status before configuration. It walks through configuring global parameters such as the hostname, passwords, and IP settings. Finally it recaps how to access privileged EXEC mode, check configurations, and verify a router's initial startup status using show commands.
This document provides instructions for configuring Cisco Secure Access Control Server (ACS), including deploying ACS servers, configuring new features in ACS 4.2, using RDBMS synchronization, setting password policies, configuring agentless host support, PEAP/EAP-TLS authentication, syslog logging, and network access control. It describes factors to consider for deployment and provides step-by-step examples for common configuration scenarios. The document is intended for security administrators who configure and maintain network and application security using ACS.
Option #1: Mastery Finance Calculations
Problem 1
Hologram Corporation is a holding company with four main subsidiaries. The percentage of its business coming from each of the subsidiaries, and their respective betas, are as follows:
Subsidiary
Percentage of Business
Beta
Water Company
60%
.70
Cable Company
25%
.90
Real estate
10%
1.30
Technology companies
5%
1.50
1. What is the company’s beta?
2. Assume that the risk-free rate is 6% and that the market risk premium is 5%. What is the holding company’s required rate of return?
Problem 2
Surf Bicycles Inc. Will manufacture and sell 200,000 units next year. Fixed costs will total $500,000, and variable costs will be 60% of sales. The bicycles will sell for $200 each.
The firm wants to achieve a level of earnings before interest and taxes of $250,000. How many units must they sell to achieve that result?
Problem 3
Alpha Electronics has the following income statement:
Sales
400,000
Total variable costs
240,000
Contribution margin
160,000
Fixed costs
140,000
EBIT
20,000
Calculate the new EBIT and percent change, assuming:
1. Sales increase by 20%
2. Sales decrease by 20%
Problem 4
Given the following information:
Total asset turnover
2.0 times
Accounts receivable turnover
25 times
Fixed asset turnover
5 times
Inventory turnover (based on cost of goods sold)
5 times
Current ratio
2
Sales (all on credit)
$5,000,000
Cost of goods sold
70% of sales
Debt ratio
60%
Calculate:
Cash
Accounts receivable
Inventories
Net fixed assets
Total assets
Current liabilities
Long-term debt
Total liabilities
Common equity
Total liabilities and common equity
Problem 5
Given the following information:
Sales Growth Rate
25%
COGS / Sales
65%
Operating Expense / Sales
20%
Depreciation Expense (000)
$40
Interest Expense (000)
$10
Tax Rate
40%
Dividends (000)
$20
Calculate the following information for 20X1:
Income Statement (000)
20X0
20X1
Sales
1500
Cost of goods sold
975
Gross profit
525
Operating costs
300
Depreciation expense
40
Net Operating Profit
185
Interest Expense
10
Earnings Before Taxes
175
Taxes
70
Net Income
105
Dividends
$20
Addition to Retained Earnings
$85
Network LAN Design with VoIP and Wireless Services
This section will provide a detailed LAN-design of network with VoIP services, Wireless services, protocols, devices, and interconnectivity, with WAN.
This section includes but not limited to
· Equipment List
· Hierarchical IP scheme and VLAN
· Link IP addresses
· High Level Diagram
· Voice and Wireless Design
Equipment List:
Select all networking hardware
Suggested Template
Device
Cisco Model#
Quantity
Comments
Distribution Switches
Cat 3850 Series Swiches
2
48 port model, wireless capacity/PoE
Branch office router
RV220W Wireless
2
4 port switch, built in firewall
Access Switches
Cat 2600
10
48 ports
IDS
Network Monitoring System
Fire wall
Cisco Unified Call Manger
2
Voice services
Step 2:
Now name each device as per naming convention (.
This document provides information about Cisco's Catalyst 4500 Series Switch, including:
- Contact information for Cisco's corporate headquarters and information on how to access documentation and technical support.
- An overview of the system message format used for error messages on the Catalyst 4500, including the message structure, severity levels, and sample messages.
- Explanations of specific error messages generated by the Catalyst 4500, grouped by component or issue, along with recommended recovery procedures.
This document provides instructions and guidelines for configuring and managing Cisco networking hardware and software. It includes information on:
- Configuring redundancy features like NSF with SSO and RPR supervisor engine redundancy for high availability.
- Configuring and monitoring the switch fabric functionality for optimal performance.
- Configuring interfaces including setting speed, duplex mode, flow control, and other optional features.
- Performing enhanced fast software upgrades to minimize disruption when updating software versions.
The document contains detailed technical information, commands, and verification steps to configure and manage Cisco switches and routers for various networking needs.
This document provides information about Cisco router configuration and operation. It describes the internal and external components of Cisco routers, how to establish a console connection to configure a router, and explains the different modes of the Cisco IOS including user mode, privileged mode, and how to get context sensitive help. It also covers the initial startup process and configuration of a router through the setup command.
The document provides step-by-step instructions for installing ESXi hypervisor software on a Cisco UCS C-Series server using the Cisco Integrated Management Controller (CIMC). Key steps include: 1) Accessing the CIMC over the network and power cycling the server; 2) Mapping the ESXi installation ISO image using CIMC virtual media; 3) Installing ESXi which will host a Cisco Unified Call Manager virtual machine. Finally, 4) Configuring the ESXi management network and accessing the new hypervisor installation through vSphere client.
Similar to Cucm bk b1000_f29_00_be6k-install-guide-10 (20)
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
1. Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
First Published: January 15, 2014
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
3. C O N T E N T S
P r e f a c e Introduction v
C H A P T E R 1 Preparation 1
Required Network Information 1
C H A P T E R 2 Installation 3
Power On and Initial Setup 3
Customize ESXi Host for Remote Access 6
Access and Configure ESXi Host 8
Preloaded Files on Datastore 12
Deploy Virtual Machines 12
Install Applications on Virtual Machines 13
Examples of Application Installation 17
Install Cisco Unified Communications Manager 17
Install Cisco Video Communications Server 18
C H A P T E R 3 Initial Configuration 19
Browse, Setup, and Apply Licenses 19
Where To Go From Here 20
For More Information 20
A P P E N D I X A Business Edition 6000 Software Load Summaries 21
Business Edition 6000 Software Load Summary Export Restricted Version 9X10X-K9-01 21
Business Edition 6000 Software Load Summary Export Unrestricted Version 9X10X-XU-01 24
A P P E N D I X B Business Edition 6000 Application Requirements 29
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
iii
5. Introduction
Cisco Business Edition 6000 (BE6000) is designed for organizations with up to 1000 employees. The solution
offers premium voice, video, mobility, messaging, conferencing, instant messaging and availability; and
contact center features on a single, integrated platform. The solution provides core communication capabilities
that midsize businesses need for improved collaboration across their value chain.
This document provides step-by-step guidance on how to configure a BE6000 server and how to install a
selection of collaboration applications.
BE6000 consists of the following:
• Cisco Unified Computing System C220M3 Rack-mount server
• VMware Hypervisor, ESXi (Customized for BE6000)
• Cisco Prime Collaboration Provisioning
• Cisco Unified Communications Manager
• Cisco Unity Connection
• Cisco Unified Communications Manager IM and Presence Service
• Cisco Expressway
• Cisco TelePresence Conductor
• Cisco Unified Contact Center Express
• Cisco Emergency Responder
• Cisco TelePresence Video Communication Server
• Cisco Unified Attendant Consoles
• Cisco Paging Server
For design and virtualization details, see Business Edition 6000 Application Requirements, on page 29 .
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
v
7. C H A P T E R 1
Preparation
Ensure that the BE6000 server is rack-mounted, connected to electrical power source and customer data
network as illustrated in the Quick Start Guide (QSG), which is included in the shipping box. Also ensure
that a monitor and keyboard are connected to the server.
Note
Before you proceed with installation, collect the network information from the data network administrator.
• Required Network Information, page 1
Required Network Information
Collect the following network information from the data network administrator:
• IP Addresses for the following:
◦VMware Hypervisor (ESXi)
◦Each collaboration application to be installed
◦(optional) CIMC, if remote console access is required
• Subnet Mask
• Gateway IP address
• DNS server IP address
• Hostname for each application
• (optional) Domain Name
• NTP server IP address
• Time zone
• (optional) SMTP server
The next sections list the lab validated steps to install a BE6000 server. After collecting the required network
information, follow the rest of the document carefully.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
1
8. Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
2
Preparation
Required Network Information
9. C H A P T E R 2
Installation
• Power On and Initial Setup, page 3
• Customize ESXi Host for Remote Access, page 6
• Access and Configure ESXi Host , page 8
• Deploy Virtual Machines, page 12
• Install Applications on Virtual Machines, page 13
Power On and Initial Setup
Before You Begin
Ensure that the BE6000 server has been rack mounted, connected to a power supply, connected to the data
network, and a monitor and keyboard is connected to the server, as described in the Quick Start Guide.
Procedure
Step 1 Verify that power is connected and the LED status is as shown in Figure 2.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
3
10. The power button LED (2) is orange, and the five LEDs between the console port (1) and power button are
green. If not, check the electrical connection.
Figure 1: Power On, Console Port, and LED Status
Step 2 Verify that the monitor and keyboard are connected to the console port. (Figure 2-1).
Step 3 Power on the monitor.
Step 4 Push the power button (Figure 2-1) and verify that the power button LED the disk LED disk drive change to
green.
Step 5 Watch the boot process on the monitor.
Step 6 (Optional) Press F8 to enter the CIMC configuration dialog.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
4
Installation
Power On and Initial Setup
11. CIMC is needed if you want remote control, the ability to monitor UCS hardware, and also remote access to
the console. Configure the IP address for CIMC, and then exit.
Step 7 (Optional) If using CIMC for console access, browse to the IP address that you configured, and use the default
username as admin and password as password. The CIMC screen is shown in Figure 3. Navigate the CIMC
for various tasks, such as Locater LED, and KVM Console as marked in Figure 3.
Figure 2: Cisco Integrated Management Controller
Step 8 (Optional) Test the locator LED by clicking Locator LED on the CIMC menu, and verify that bright blue
LED (Figure 3-1) is turned on. This CIMC feature helps locate the server in a large datacenter.
Step 9 Wait until the ESXi loads and displays the configuration screen on the console.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
5
Installation
Power On and Initial Setup
12. Customize ESXi Host for Remote Access
Follow this procedure to customize the ESXi host (the VMware hypervisor) to enable remote access through
the vSphere client.
Procedure
Step 1 Load the ESXi host software.
The console screen appears, as shown in the following figure.
Figure 3: Console Screen After ESXi Loads
Step 2 Press F2 to enter the System Customization menu as shown in the following figure. Select Configure Password
to change the password.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
6
Installation
Customize ESXi Host for Remote Access
13. The default username is root and password is password.
Figure 4: ESXi System Customization Menu
Step 3 Assign a static IP address to ESXi. Enter the Configure Management Network menu, and follow the instructions
on screen to change “IP Configuration” as shown in Figure 6.
Figure 5: Assign Static IP Address to ESXi Host
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
7
Installation
Customize ESXi Host for Remote Access
14. Step 4 Connect your PC to the data network, and verify that you can browse to the ESXi IP address that you configured
in the previous step. Verify the web page as shown in Figure 7.
Figure 6: The ESXi Host on BE6000
Step 5 If not already installed on your PC, download and install the vSphere client.
Access and Configure ESXi Host
Some applications on BE6000 require the services of a valid NTP server. Follow these steps to access the
ESXi host, configure NTP, configure fault tolerance for network interface cards (NICs) using the NIC teaming
feature, and browse the datastore to verify the preloaded collaboration application software.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
8
Installation
Access and Configure ESXi Host
15. Procedure
Step 1 Launch the vSphere client application and type the IP address of the ESXi host. (See Figure 8.)
Figure 7: Access ESXi Host Using vSphere Client
Step 2 Use the login credentials that you configured during ESXi system customization.
Step 3 (optional) For BE6000 before Version 9.1.2, the VMware license is not preinstalled, and you may be presented
with a 60 day evaluation license warning. This scenario can happen if you performed a factory reset to the
UCS server. In these cases, follow these steps to apply the license. You may also verify the license status
using these steps:
a) Locate the envelope marked “Cisco Vmware vSphere Hypervisor 5.0” in the shipping box.
b) Locate the card titled “Right to Use Notification” in the envelope.
c) Note the Master serial number, which is the license activation key.
d) Navigate to Configuration > Software > Licensed Features, and click Edit.
e) Select Assign a new license key to this host.
f) Click Enter Key....
g) Type in the Master serial number.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
9
Installation
Access and Configure ESXi Host
16. h) Click OK to close configuration dialogs and apply the license.
Figure 8: Configuring and Managing ESXi Host and Virtual Machine
Step 4 Add the NTP server:
a) Navigate to Configuration > Software > Time Configuration.
b) Click Properties to launch the Time Configuration screen.
c) Update the Time Click Options... .
d) Select NTP Settings.
e) Click Add and type the IP address of NTP server.
f) Click OK, and select General, select Start and stop with host, and click Start button, followed by click
OK to close the configuration screens.
Step 5 Configure fault tolerance by using the NIC teaming feature in VMware:
a) Navigate to Configuration > Hardware > Networking.
b) Click Properties for “Standard Switch: vSwitch0,” as shown in Figure 10.
c) In the configuration screen vSwitch0 Properties, select the tab Network Adapters.
d) Click Add… to add the NIC that is connected to data network.
e) Follow the interactive configuration dialogs and close the configuration screens until you see two or more
NICs are added to vSwitch0, as shown in Figure 10.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
10
Installation
Access and Configure ESXi Host
17. By default, only one NIC is enabled in ESXi and identified as
vmnic0.
Note
Figure 9: Fault Tolerance for BE6000 Network Connectivity
The ESXi host is now ready for deploying virtual machines, which will host individual collaboration
applications. Software for these applications are preloaded on the datastore of the BE6000 server.
Step 6 Browse the datastore:
a) Navigate to Configuration > Hardware > Storage.
b) Click Datastore to list the datastores in the BE6000 server.
c) Select a datastore, then right-click and select Browse Datastore as shown in Figure 11.
Figure 10: Browse Datastore to View Preloaded Collaboration Software, License, and Open Virtualization Archive Files
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
11
Installation
Access and Configure ESXi Host
18. Step 7 Download all Open Virtualization Archive (OVA) and license files to the desktop of your PC. Make sure you
have sufficient space to download these files.
As of Release 9.1(2), you must download the Unified Contact Center Express ISO image to extract
the evaluation license. You also must download the ISO image of the paging server and extract the
OVA template file for the paging server.
Note
What to Do Next
Deploy virtual machines.
Preloaded Files on Datastore
Cisco BE6000 is shipped with some selected Collaboration software, license files and Open Virtualization
Archive (OVA) files that are preloaded on the datastore. Consider the following points for a basic understanding
of the file types that are preloaded in the datastore:
ISO
An ISO file is a DVD image that was used to distribute application software in the past.
OVA
Open Virtualization Archive (OVA), a file with the “.ova” extension, is used to package and distribute
the virtual machine template.
Some OVA files may also have application software preinstalled on the virtual machine. In this case,
an ISO image is not needed (for example, cpc-provisioning-9.5.0-245-small.ova, listed
in Table 1).
Some OVA files do not have application software preinstalled. In this case, you must install the software
using the ISO file that is provided on datastore (for example, cucm_9.1_vmv8_v1.7.ova and
associated ISO file Bootable_UCSInstall_UCOS_9.1.2.10000-28.sgn.iso, listed in
Table 1) .
For pre-loaded files in the Export Restricted version 9X10X-K9 and Export Unrestricted version
9X10X-XU, refer to Business Edition 6000 Software Load Summaries, on page 21.
Note
Deploy Virtual Machines
Follow this procedure to deploy virtual machines for applications that are listed in Table 1. The OVA template
file defines the virtual machine for specific applications.
Note the following:
• Blank OVAs are deployed in 1-3 minutes, and a preinstalled OVA may take 10-15 minutes to deploy.
• Figure 12 shows the view of vSphere client after deployment of various collaboration applications virtual
machines. You can also see the time that is taken to deploy the last two virtual machines.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
12
Installation
Preloaded Files on Datastore
19. • The example in Figure 12 is for the High Density (HD) server model (see the SKU that is highlighted
below), which can host nine applications. The Medium Density (MD) server model of BE 6000 can host
five applications.
Figure 11: Deployed Virtual Machines for Applications Viewed in VSphere Client
Procedure
Step 1 On the vSphere Client, navigate to File > Deploy OVF Template.
The Deploy OVF Template screen is launched.
Step 2 Browse and select the source OVA template file on your PC. See Table 1 for application and filename mapping.
Step 3 Continue to click Next to accept license agreements and default values.
Step 4 Configure your deployment:
• For Cisco Unified Communications Manager, Cisco Unity Connection and IM and Presence Service,
select 1000 Users.
• For Cisco Unified Contact Center Express, select 100 Agents.
• For Cisco Emergency Responder, select 12000 user node – C200 only from the drop-down menu.
Step 5 For VCS and Paging server, provide a meaningful name.
What to Do Next
After deploying all required virtual machines, install individual collaboration applications.
Install Applications on Virtual Machines
Follow this procedure to install and set up the applications on their designated virtual machines.
The approximate time that is required for each application is as follows:
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
13
Installation
Install Applications on Virtual Machines
20. • Cisco Unified Communications Manager: 60 minutes
• Cisco Unity Connection: 60 minutes
• Cisco Unified Communications Manager IM and Presence Service: 45 minutes
• Cisco Prime Collaboration: 30 minutes
• Cisco Unified Contact Center Express: 60 minutes
• Cisco Emergency Responder: 45 minutes
• Video Communication Server: 60 minutes
• Cisco Paging Server: 15 minutes
Note • Do not install Unified Communications Manager and Cisco Unity Connection simultaneously,
because they use the same ISO image.
• You can install multiple applications concurrently to save time.
• A carefully planned installation should not take more than three hours.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
14
Installation
Install Applications on Virtual Machines
21. Procedure
Step 1 Contact the data network administrator and make sure that you collect the network information that is described
in “Preparation.”
Step 2 Plan the sequence of installing the applications to minimize the time that is required.
Step 3 On the vSphere client, select an application’s virtual machine. The client changes the panel name to application
name, and adds one more tab named “Getting Started”. Compare Figure 12 and Figure 13. Right click to open
the action menu as shown in Figure 13.
Figure 12: Select an Application VM to Edit Settings, Power On, and Take Any Other Administrative Action
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
15
Installation
Install Applications on Virtual Machines
22. Step 4 For VMs that are deployed using blank OVA templates, you need to edit the settings of virtual machines to
connect the ISO image of application software at power on. Note that Unified Communications Manager and
Cisco Unity Connection use same ISO file (see Table 1).
Figure 13: Edit Virtual Machine Settings to Connect ISO Image of Application Software
a) In the Device Type section, select the Datastore ISO File radio button.
b) Browse to the datastore and select the ISO file for the application.
c) Make sure to check the box Connect at Power On as shown in Figure 14.
Step 5 Select Edit Settings… from the right-click menu as shown in Figure 13.
The Virtual Machines Properties editing screen appears, as shown in Figure 14.
Step 6 To begin installation of each application, follow these steps: Installation will continue automatically for the
time listed in Step 2.
a) power on the virtual machine and open console using the right click menu shown in Figure 13.
b) Follow the interactive installation procedure on console.
c) Accept the defaults and provide the information that you collected in Step 1. Installation is complete and
successful when you are able to do a successful login on console.
• For Prime Collaboration, Installation starts after typing setup for the “localhost login:”. After that, the
installation script asks for network information and various credentials (passwords for admin, root,
globaladmin) information. Installation continues for 30 minutes.
• For a VCS server, installation starts after using first-time username password as admin and TANDBERG.
Type y when asked “Run install wizard [n]:” and continue with interactive installation.
If you require detailed installation guidance, see the Installation Guide of the applications on the
Cisco Business Edition 6000 Support Documents website, listed in “For More Information”.
Note
What to Do Next
After installing all required applications, access applications using a web browser and perform initial setup
of some applications.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
16
Installation
Install Applications on Virtual Machines
23. Examples of Application Installation
The following are steps to install Cisco Unified Communications Manager (a blank OVA) and Cisco Video
Communications Server (a preinstalled OVA).
Install Cisco Unified Communications Manager
Procedure
Step 1 Power on and open the console of the virtual machine, as illustrated in Figure 13.
Step 2 On the DVD Found window, select No for media check.
Step 3 In the Product Deployment Selection window, select Cisco Unified Communications Manager, then select
OK. Finally, select Yes in the next Proceed with Install window.
Enterprise License Manager is also deployed as part of this installation.Note
Step 4 Perform the following steps:
a) In the Platform Installation Wizard window, select Proceed.
b) In the Apply Patch window, select No.
c) In the Basic Install window, select Continue.
d) Select Timezone in the next window followed by Auto Negotiation for Ethernet connection, and the
default size for MTU.
Step 5 Select No for DHCP.
The Static Network Configuration window appears.
Step 6 Enter the hostname, (such as CUCM), IP address, IP mask, and gateway address; then select OK. Select Yes
for DNS Client, followed by entering DNS server information in next window.
Step 7 The next two windows prompt you to set up administrative login information and organization information,
followed by confirming whether the server is the first node; in most cases, select Yes.
Step 8 In the next windows, select No for network connectivity test, and again provide the hostname, IP address and
security password. Finally, provide a valid reachable NTP server.
Step 9 The next two windows prompt you to set a security password and SMTP server information. Finally, application
user information is required, followed by the last window Platform Configuration Confirmation. Select OK
to continue the installation, which will last for approximately 60 minutes without any user interaction on the
console. After you see the login prompt on the console, access the Unified Communications Manager IP
address in a web browser.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
17
Installation
Examples of Application Installation
24. Install Cisco Video Communications Server
Procedure
Step 1 Power on and open the console of the virtual machine, as illustrated in Figure 13.
Step 2 At the login prompt, enter admin for username and TANDBERG for the password.
Step 3 At the Run Install Wizard prompt, type Y and press Enter.
Step 4 To change password, type Y and press Enter, and at the prompt type the new password and click Enter.
Step 5 The next series of prompts are for network information. Select the IP Protocol (the default is IPv4), provide
the IP address, subnet mask, and default gateway address. Finally, select the ethernet speed of the LAN (the
default is auto).
Step 6 For the Run SSH (Secure shell) daemon, type Y and press Enter.
Step 7 At the Restart Now prompt, type Y and press Enter.
Step 8 After the system reboots, access the Cisco Video Communication Server in a web browser.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
18
Installation
Examples of Application Installation
25. C H A P T E R 3
Initial Configuration
• Browse, Setup, and Apply Licenses, page 19
• Where To Go From Here, page 20
• For More Information, page 20
Browse, Setup, and Apply Licenses
Follow these steps to access each application, perform first-time setup for some applications, and apply the
licenses.
Procedure
Step 1 To access the administration portal for each individual application, browse to the IP address of application.
Consider the following information:
• Paging Server: Collect information about the application URL from the virtual machine console. The
default first-time username and password are admin and changeMe.
• Cisco Prime Collaboration Provisioning: Browse to the IP address and use globaladmin as the username.
Step 2 All applications come with a preinstalled demo license for a 60 day evaluation period. Two applications have
the following exceptions:
• Cisco Prime Collaboration: Download the license, tool and readme file from datastore. Use the instructions
in the readme file to apply the license (a permanent license with no expiration).
• Cisco Unified Contact Center Express: Demo licenses have a 30 day evaluation period. You must extract
the demo license files from the ISO file. After you have demo license files on your PC, browse to the
ESXi portal of Unified Contact Center Express and follow the instructions to apply the demo license.
Step 3 After purchasing the license, you should have received the Product Authorization Key (PAK) through either
a paper certificate or email from Cisco. The PAK should then be registered to “Product License Registration”
to receive license key in form of a software file.
Step 4 Applyy license keys in the application using the administration portal:
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
19
26. • Prime Collaboration Provisioning: No PAK is needed because the product comes with a permanent
license.
• Paging Server: No PAK is needed because the product comes with a permanent license for basic paging.
• Unified Communications Manager and Cisco Unity Connection: Browse the IP Address of Unified
Communications Manager and click Cisco Enterprise License Manager. Select License > Install
License File and follow instructions.
Cisco Enterprise License Manager (ELM) is automatically installed as part of the Unified
Communications manager installation.
Note
• Cisco VCS: After registering the PAK for VCS, the customer receives two keys (Release key and Option
key). In the administration portal, select Maintenance > Option keys. Apply the Release key first, and
then apply the Option key.
Step 5 When you need to upgrade the software version, use the Cisco Product Upgrade Tool (PUT).
A valid service contract is required to use the PUT to download upgrade images.Note
Related Topics
Product License Registration
Cisco Product Upgrade Tool (PUT)
Where To Go From Here
After you verify successful installation, see the Prime Collaboration Provisioning Guide for Cisco Business
Edition 6000 in the Cisco Business Edition 6000 Support Documents. Use this guide to start the initial
configuration of Unified Communications Manager, Cisco Unity Connection and IM and Presence Service
applications.
For More Information
• Cisco Business Edition 6000 Main website
http://www.cisco.com/go/be6000
• Cisco Business Edition 6000 Support Documents
http://www.cisco.com/en/US/products/ps11369/tsd_products_support_series_home.html
• Cisco Business Edition 6000 Support Community
http://supportforums.cisco.com/community/netpro/small-business/voiceandconferencing/be6000
• Cisco BE6000 Install and Upgrade Guides
http://www.cisco.com/en/US/products/ps11369/prod_installation_guides_list.html
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
20
Initial Configuration
Where To Go From Here
27. A P P E N D I X A
BusinessEdition6000SoftwareLoadSummaries
• Business Edition 6000 Software Load Summary Export Restricted Version 9X10X-K9-01, page 21
• Business Edition 6000 Software Load Summary Export Unrestricted Version 9X10X-XU-01, page 24
BusinessEdition6000SoftwareLoadSummaryExportRestricted
Version 9X10X-K9-01
This document details the software that has been preloaded on this server for your convenience.
Every attempt is made to keep the software versions in this build as up to date as possible; however, it may
be the case that newer code has been released since this server was manufactured. If this is the case, you may
download current versions either from Cisco Software Center (CSC), or via Cisco Electronic Software Delivery
(ESD). Details of how to use Electronic Software Delivery are provided via email when ordering licenses for
your chosen applications. Table 1 below lists the included files and indicates where they may be found.
Version Choice
This software preload set includes installation files for both version 9 and 10 unified communications
applications (Cisco Unified Communications Manager, Cisco Unity Connection, Cisco Unified Communications
Manager Instant Messaging and Presence Server and Prime Collaboration Provisioning). You may install any
of the other preloaded applications with either of these releases. Unified communications version 9 or 10
applications must be used together. Table 1 indicates which files to use for either a version 9 or 10 unified
communications installation.
Table 1: Preloaded Software
Version10Version 9AccessFilenameApplication / File
Cisco Unified Communications Manager & Cisco Unity Connection
Version 9 and 10 upgrade images are available via ESD
only.
Note
XESDBootable_UCSInstall_UCOS_UNRST_9.1.2.11900-12.sgn.isoCommon version 9
application image
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
21
30. Additional Software
To ensure consistent entitlement across Cisco Collaboration products, licensing purchased with the Business
Edition 6000 may also entitle you to use the applications listed in the following table. Software for these
applications have not been included in this software bundle as they may require hypervisor licensing or
hardware resources that are not typically available with Business Edition servers. If you would like to use
these applications and have the appropriate license and hardware, software may be obtained through ESD or
Software Center.
Table 2: Additional Software
AccessEntitlement/RequirementsApplication
ESDAvailable with all UCM 10.x user license purchases.
Requires Foundation Hypervisor license
Cisco Prime Collaboration
Deployment
CSCStandard license available for all UCM deployments.
Requires 6 vCPU and 14GB vRAM.
Cisco Prime Collaboration
Assurance
ESDAvailable with CUWL Pro licensing. Requires dedicated
server and Foundation Hypervisor license.
Cisco WebEx Meeting Server
CSCAvailable for personal four way meeting rooms with
CUWL Pro licensing. Requires UCS C240 server.
Cisco Virtual Telepresence
Server
Business Edition 6000 Software Load Summary Export
Unrestricted Version 9X10X-XU-01
This document details the software that has been preloaded on this server for your convenience.
Every attempt is made to keep the software versions in this build as up to date as possible; however, it may
be the case that newer code has been released since this server was manufactured. If this is the case, you may
download current versions either from Cisco Software Center (CSC), or via Cisco Electronic Software Delivery
(ESD). Details of how to use Electronic Software Delivery are provided via email when ordering licenses for
your chosen applications. Table 1 below lists the included files and indicates where they may be found.
Version Choice
This software preload set includes installation files for both version 9 and 10 unified communications
applications (Cisco Unified Communications Manager, Cisco Unity Connection, Cisco Unified Communications
Manager Instant Messaging and Presence Server and Prime Collaboration Provisioning). You may install any
of the other preloaded applications with either of these releases. Unified communications version 9 or 10
applications must be used together. Table 1 indicates which files to use for either a version 9 or 10 unified
communications installation.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
24
Business Edition 6000 Software Load Summaries
Business Edition 6000 Software Load Summary Export Unrestricted Version 9X10X-XU-01
32. Version10Version 9AccessFilenameApplication / File
Cisco Unified Contact Center Express
XXESDBootable_UCSInstall_UCCX_10_0_1_UCOS_10.0.1.10000-56.sgn.isoApplication image
XXCSCUCCX_10.0_vmv8_v2.5.ovaVirtual machine
template
XXCSCs42800xc2_2_1_BE6K.ovaVirtual application
installer
Cisco Telepresence Video Communication Server
XXCSCs42701x7_2_2_BE6K.ovaVirtual application
installer
Cisco Prime Collaboration Provisioning
XCSCcpc-provisioning-9.5.0-245-small.ovaVersion 9.5 virtual
application installer
XESDPCP90BE6K.licVersion 9.5 BE6000
License File
X-batchProvisioningSamples.zipVersion 9.5 Batch
Provisioning
Templates
X-PCPReadme,pdfVersion 9.5 License
README document
XCSCcpc-provisioning-10.0.0-791-small.ovaVersion 10 virtual
application installer
XESDPCP10BENNL2500.licVersion 10 BE6000
License File
X-BatchProvisioning10Samples.zipVersion 10 Batch
Provisioning
Templates
X-PCP10_BE6000_Readme.pdfVersion 10 License
README document
XXCSCOpenSSL1.0.0e-PC-Linux.zipOpenSSL application
package
Virtualization Hypervisor
XXVMwareESXi-5.1.0-1065491-custom-Cisco-5.1.1.1.isoApplication image
Additional Software
To ensure consistent entitlement across Cisco Collaboration products, licensing purchased with the Business
Edition 6000 may also entitle you to use the applications listed in the following table. Software for these
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
26
Business Edition 6000 Software Load Summaries
Business Edition 6000 Software Load Summary Export Unrestricted Version 9X10X-XU-01
33. applications have not been included in this software bundle as they may require hypervisor licensing or
hardware resources that are not typically available with Business Edition servers. If you would like to use
these applications and have the appropriate license and hardware, software may be obtained through ESD or
Software Center.
Table 4: Additional Software
AccessEntitlement/RequirementsApplication
ESDAvailable with all UCM 10.x user license purchases. Requires
Foundation Hypervisor license
Cisco Prime Collaboration
Deployment
CSCStandard license available for all UCM deployments. Requires 6
vCPU and 14GB vRAM.
Cisco Prime Collaboration Assurance
ESDAvailable with CUWL Pro licensing. Requires dedicated server and
Foundation Hypervisor license.
Cisco WebEx Meeting Server
CSCAvailable for personal four way meeting rooms with CUWL Pro
licensing. Requires UCS C240 server.
Cisco Virtual Telepresence Server
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
27
Business Edition 6000 Software Load Summaries
Business Edition 6000 Software Load Summary Export Unrestricted Version 9X10X-XU-01
34. Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
28
Business Edition 6000 Software Load Summaries
Business Edition 6000 Software Load Summary Export Unrestricted Version 9X10X-XU-01
35. A P P E N D I X B
BusinessEdition6000ApplicationRequirements
vDiskvRAMvCPUScaleCisco BE6000 UC
Applications
1x80GB4 GB21000 UsersCisco Unified
Communications Manager
1x160GB4 GB1
One
vCPU
should
be
reserved
for
ESXi
scheduler
if Cisco
Unity
Connection
is
deployed
in a
VM.
Note
1000 UsersCisco Unity Connection
1x80GB2 GB11000 UsersUCM IM and Presence
Service
1x90GB2 GB11000 UsersCisco Prime Collaboration
Provisioning
1x146GB8 GB2100 AgentsCisco Unified Contact
Center Express
1x80GB4 GB21000 UsersCisco Emergency
Responder
1x128GB4 GB2100 Video or 200 Audio
sessions
Cisco Telepresence Video
Communication Server
(Expressway)
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
29
36. vDiskvRAMvCPUScaleCisco BE6000 UC
Applications
1x128GB4 GB230 MCU / TS resources
and 2400 Call session
Cisco Conductor
1x80GB4 GB11000 usersPaging Server
1x72GB4 GB1Varies by EditionCisco Unified Attendant
Console
VMware Hypervisor ESXi 5.1 reserves 2GB RAM.Note
For more information, see Cisco Unified Communications for Midsize Businesses: Virtualization Options
Solution Overview and Cisco Business Edition 6000 Co-Residency Policy Requirements Overview at http://
www.cisco.com/go/be6000.
Cisco Business Edition 6000 Installation Guide, Release 10.0(1)
30
Business Edition 6000 Application Requirements